Commands using umask (2)

  • In OS X Yosemite v10.10.3 and later, you can use this command in Terminal while logged in as an admin user. Replace nnn with the desired umask value, such as 027 or 002. This sets the user's umask for all apps they open, such as Finder, TextEdit, or Final Cut Pro, or apps accessed from the command line. It also controls the permissions set on new files created by any of these apps. For more information about setting the umask in Yosemite, see?man launchctl. Show Sample Output


    0
    sudo launchctl config user umask nnn
    scotteelp · 2015-05-09 02:26:05 0
  • In OS X Yosemite v10.10.3 and later, you can execute this command in Terminal while logged in as an admin user. Replace nnn with the desired umask value, such as 027 or 002. This sets the umask for daemons that are launched in the system context. Changing this value is strongly discouraged because it might change the permissions on files used by the system software. If the permissions are too restrictive, dependent software may not work. If the permissions are too open, they may introduce security issues. For more information about setting the umask in Yosemite, see man launchctl. Show Sample Output


    0
    sudo launchctl config system umask nnn
    scotteelp · 2015-05-09 02:27:11 0

What's this?

commandlinefu.com is the place to record those command-line gems that you return to again and again. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.

Share Your Commands


Check These Out

Install pip with Proxy
Installs pip packages defining a proxy

Display time of accounts connection on a system
Works on CentOS ad OpenBSD too, display time of accounts connection on a system, -p option print individual user's statistics.

Empty a file

Console clock
Shows a simple clock in the console -t param removes the watch header Ctrl-c to exit

Get a free shell account on a community server
Bash process substitution which curls the website 'hashbang.sh' and executes the shell script embedded in the page. This is obviously not the most secure way to run something like this, and we will scold you if you try. The smarter way would be: Download locally over SSL > curl https://hashbang.sh >> hashbang.sh Verify integrty with GPG (If available) > gpg --recv-keys 0xD2C4C74D8FAA96F5 > gpg --verify hashbang.sh Inspect source code > less hashbang.sh Run > chmod +x hashbang.sh > ./hashbang.sh

Formatted list - WWNs of all LUNs
Use `scsi_id` to positively identify which LUNs are which (i.e. compare with the list of LUNs you created on your disk array) (shown: RHEL5 usage) Debian usage: $ # for i in /dev/sd* ; do wwn=`/lib/udev/scsi_id -g --device $i` ; [ "$wwn" != "" ] && echo -e ${i##*/}'\t'$wwn ;done

find text in a file
this will find text in the directory you specify and give you line where it appears.

Remove security limitations from PDF documents using ghostscript (for Windows)
#4345 also works under windows

Simplification of "sed 'your sed stuff here' file > file2 && mv file2 file"

Convert wma to mp3@128k
Convert all wma to mp3@128k with ffmpeg into directory.


Stay in the loop…

Follow the Tweets.

Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.

» http://twitter.com/commandlinefu
» http://twitter.com/commandlinefu3
» http://twitter.com/commandlinefu10

Subscribe to the feeds.

Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):

Subscribe to the feed for: